1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
romanna [79]
3 years ago
6

a ____ consists of wires connecting the cpu and other parts of the computer. The _____ transfers data between CPU and memory uni

t.
Computers and Technology
1 answer:
geniusboy [140]3 years ago
4 0

Answer:

A power supply consists of wires connecting the cpu and other parts of the computer. The data bus transfers data between CPU and memory unit.

Explanation:

You might be interested in
PLZ BEEN STUCK ON THIS
Gnoma [55]

Answer:

am not really sure but between TCP/IP and data link am sorry for not being precise .

6 0
3 years ago
Read 2 more answers
Question #5
Anestetic [448]

Answer:

d;  attribute

Explanation:

8 0
3 years ago
Read 2 more answers
From the perspective of the prosecution, the safest legal means of obtaining incriminating documents from a suspect is by: a. Su
never [62]

Answer:

a. Subpoena duces tectum

Explanation:

<u>Options C </u>(an informant steal the documents)<u> and D</u> (discrete copy of the documents) <u>would be considered illegal and/or inadmissible in most places</u>, so you should avoid these.

Options A (subpoena) and B (search warrant) are usually issued by a judge after considerations, so they are both legal ways to obtain something.

In a subpoena duces tecum, the court orders an individual (or a moral person) to produce (usually very specific) documents to court or face penalty.

<u>A search warrant is executed by law enforcement officials who are seeking information to help in their investigation</u>, usually not highly specific (not 'search for a copy of the April 10 minutes of the meeting.').

3 0
4 years ago
The Hootsuite Analytics overview automatically analyzes two time periods: the one you select, and the corresponding length of ti
Valentin [98]

Answer

The benefit is that it put your result in a more historical perspective

Explanation

The Hootsuite Analytics and measuring tools work to provide a complete report of the companies social media contributions at each marketing stages. The Hootsuite Analytics measures the overall performance , the effect for in depth analysis of shared posts including social listening. The analysis is able to monitor multiple social streams, schedule posts in advance  and create a simple analytics data for view


6 0
4 years ago
Read 2 more answers
Research and discuss the similarities and differences between cloud computing and client-server computing. Discuss the pros and
harkovskaia [24]

Answer:

Cloud computing as a virtual hosting tool, is much more theoretical. Both servers, applications, and communications are hosted in the cloud, off property, rather than being available via computer machine whereas In computing client/server, a controller gets client requests mainframes and needs to share its services, programs and/or data of one sometimes more client systems on the internet, and a client would be a portable platform that specific portions with a server and make use of a finite resource.

Explanation:

<u>Similar to cloud computing and client-server computing: - </u>

  • The cloud computing and client-server networking underpinning principles are the same. That is contact between client and server.
  • Throughout networking and client-server networking, user nodes can communicate (queries) with databases that live locally or are located in many other networks.

<u>Difference between computing and client-server computing: </u><u>- </u>

Resources: -

  • In computing client-server, the corporation or association controls the tools.
  • The services are offered in cloud computing by third parties or other businesses.

<u>The purpose of cloud computing and client-server computing is different:- </u>

  • Client-server computing is targeted at use. In computation, client-server clients request a product from the cloud. The operating system runs the test, then returns it.
  • Cloud computing is a sort of system in which the IT-related services are leased to the clients as a contract.

<u>Pros and cons of Cloud Computing:- </u>

The Pros:-

  • Lower costs for business:-The cloud is saving a lot of money for a medium-sized or small enterprise.
  • Better Reliability:- A dedicated group of experts performs all programming with such a cloud computing alternative.

The Cons:-

  • Limited Control:- When a firm stores cloud data, they have very limited control of it.
  • There have been security issues. The cloud isn't too attuned for every company to position some information on even a cloud.

<u>Pros and cons of client-server computing:- </u>

The Pros:-

  • Improved data sharing:- Data stored via the normal business method and processed on a server is available over an approved connection for the intended users.
  • Security:- Database has stronger access control and methods to ensure data could only be accessed or abused by approved clients.

The Cons:-

  • Overloaded Servers:- When multiple simultaneous requests from the client are made, the server is significantly overloaded, causing congestion in traffic.
  • Impact of centralized architecture:- Because it is centralized if a vital server fails to satisfy customer requests, the client-server then lacks good network robustness.

5 0
4 years ago
Other questions:
  • Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing ph
    7·1 answer
  • BRAINLYEST IF CORRECT!!! What is the special feature of the View Side by Side command?
    6·2 answers
  • "Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required f
    6·1 answer
  • Egovernment involves the use of strategies and technologies to transform government by improving the delivery of services and en
    7·1 answer
  • Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database man
    8·1 answer
  • JAVA Question!
    13·1 answer
  • Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals
    7·1 answer
  • The method "someOtherMethod" is NOT defined as static. This means...
    5·1 answer
  • How many votes does a candidate need to become president of the US ?
    12·2 answers
  • I need help! Please please
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!